CVE-2022-39105: CWE-190 Integer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
AI Analysis
Technical Summary
CVE-2022-39105 is a medium-severity vulnerability identified in sensor drivers used in various Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). The vulnerability arises from an integer overflow (CWE-190) due to a missing bounds check in the sensor driver code. This flaw can lead to an out-of-bounds write operation in kernel memory. Specifically, the integer overflow causes the calculation of buffer sizes or indices to wrap around, allowing the driver to write data beyond the intended memory boundaries. The consequence of this is a potential local denial of service (DoS) condition in the kernel, which can crash the device or cause instability. The vulnerability affects devices running Android versions 10, 11, and 12 that incorporate these Unisoc chipsets. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with the vector indicating local access (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), but high impact on availability (A:H). There are no known exploits in the wild, and no patches have been linked in the provided data, suggesting that mitigation may require vendor firmware or driver updates. The vulnerability is significant because kernel-level crashes can disrupt device operation and potentially be leveraged as part of a broader attack chain, although exploitation requires local access and some privileges.
Potential Impact
For European organizations, the impact of CVE-2022-39105 primarily concerns devices using affected Unisoc chipsets running Android 10 to 12. These chipsets are commonly found in budget and mid-range smartphones and IoT devices. A local attacker or malicious application with limited privileges could exploit this vulnerability to cause kernel crashes, leading to denial of service conditions on affected devices. This could disrupt business operations relying on mobile communications or IoT infrastructure, especially in sectors where device availability is critical, such as logistics, healthcare, or manufacturing. While the vulnerability does not directly compromise confidentiality or integrity, repeated crashes or instability could degrade user trust and device reliability. Additionally, in environments where devices are used for secure communications or critical monitoring, availability loss could have operational consequences. The requirement for local access and low privileges limits remote exploitation risk but does not eliminate insider threats or risks from malicious apps installed on devices. The absence of known exploits reduces immediate risk but does not preclude future exploitation. Organizations with large deployments of affected devices should consider this vulnerability in their risk assessments and patch management strategies.
Mitigation Recommendations
To mitigate CVE-2022-39105, European organizations should: 1) Identify and inventory all devices using Unisoc chipsets listed in the vulnerability, focusing on Android 10, 11, and 12 versions. 2) Engage with device manufacturers and Unisoc to obtain firmware or driver updates that address the integer overflow and apply patches promptly once available. 3) Implement strict application control policies to limit installation of untrusted or unnecessary apps that could exploit local vulnerabilities. 4) Employ mobile device management (MDM) solutions to monitor device health and detect abnormal crashes or kernel panics indicative of exploitation attempts. 5) Educate users about the risks of installing apps from untrusted sources and the importance of applying OS updates. 6) For critical deployments, consider network segmentation and access controls to reduce the risk of local attackers gaining access to devices. 7) Monitor security advisories from Unisoc, Android, and relevant vendors for updates or exploit reports. Since no patches are currently linked, organizations should prioritize vendor engagement and consider temporary compensating controls such as restricting local access to devices and enforcing least privilege principles on user accounts.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2022-39105: CWE-190 Integer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
Description
In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
AI-Powered Analysis
Technical Analysis
CVE-2022-39105 is a medium-severity vulnerability identified in sensor drivers used in various Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). The vulnerability arises from an integer overflow (CWE-190) due to a missing bounds check in the sensor driver code. This flaw can lead to an out-of-bounds write operation in kernel memory. Specifically, the integer overflow causes the calculation of buffer sizes or indices to wrap around, allowing the driver to write data beyond the intended memory boundaries. The consequence of this is a potential local denial of service (DoS) condition in the kernel, which can crash the device or cause instability. The vulnerability affects devices running Android versions 10, 11, and 12 that incorporate these Unisoc chipsets. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with the vector indicating local access (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), but high impact on availability (A:H). There are no known exploits in the wild, and no patches have been linked in the provided data, suggesting that mitigation may require vendor firmware or driver updates. The vulnerability is significant because kernel-level crashes can disrupt device operation and potentially be leveraged as part of a broader attack chain, although exploitation requires local access and some privileges.
Potential Impact
For European organizations, the impact of CVE-2022-39105 primarily concerns devices using affected Unisoc chipsets running Android 10 to 12. These chipsets are commonly found in budget and mid-range smartphones and IoT devices. A local attacker or malicious application with limited privileges could exploit this vulnerability to cause kernel crashes, leading to denial of service conditions on affected devices. This could disrupt business operations relying on mobile communications or IoT infrastructure, especially in sectors where device availability is critical, such as logistics, healthcare, or manufacturing. While the vulnerability does not directly compromise confidentiality or integrity, repeated crashes or instability could degrade user trust and device reliability. Additionally, in environments where devices are used for secure communications or critical monitoring, availability loss could have operational consequences. The requirement for local access and low privileges limits remote exploitation risk but does not eliminate insider threats or risks from malicious apps installed on devices. The absence of known exploits reduces immediate risk but does not preclude future exploitation. Organizations with large deployments of affected devices should consider this vulnerability in their risk assessments and patch management strategies.
Mitigation Recommendations
To mitigate CVE-2022-39105, European organizations should: 1) Identify and inventory all devices using Unisoc chipsets listed in the vulnerability, focusing on Android 10, 11, and 12 versions. 2) Engage with device manufacturers and Unisoc to obtain firmware or driver updates that address the integer overflow and apply patches promptly once available. 3) Implement strict application control policies to limit installation of untrusted or unnecessary apps that could exploit local vulnerabilities. 4) Employ mobile device management (MDM) solutions to monitor device health and detect abnormal crashes or kernel panics indicative of exploitation attempts. 5) Educate users about the risks of installing apps from untrusted sources and the importance of applying OS updates. 6) For critical deployments, consider network segmentation and access controls to reduce the risk of local attackers gaining access to devices. 7) Monitor security advisories from Unisoc, Android, and relevant vendors for updates or exploit reports. Since no patches are currently linked, organizations should prioritize vendor engagement and consider temporary compensating controls such as restricting local access to devices and enforcing least privilege principles on user accounts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-09-01T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec67d
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 11:12:28 AM
Last updated: 7/30/2025, 7:51:25 AM
Views: 14
Related Threats
CVE-2025-9028: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-26709: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ZTE F50
MediumCVE-2025-9027: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-9026: OS Command Injection in D-Link DIR-860L
MediumCVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.