Skip to main content

CVE-2022-39105: CWE-190 Integer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Medium
VulnerabilityCVE-2022-39105cvecve-2022-39105cwe-190
Published: Fri Oct 14 2022 (10/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.

AI-Powered Analysis

AILast updated: 07/06/2025, 11:12:28 UTC

Technical Analysis

CVE-2022-39105 is a medium-severity vulnerability identified in sensor drivers used in various Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). The vulnerability arises from an integer overflow (CWE-190) due to a missing bounds check in the sensor driver code. This flaw can lead to an out-of-bounds write operation in kernel memory. Specifically, the integer overflow causes the calculation of buffer sizes or indices to wrap around, allowing the driver to write data beyond the intended memory boundaries. The consequence of this is a potential local denial of service (DoS) condition in the kernel, which can crash the device or cause instability. The vulnerability affects devices running Android versions 10, 11, and 12 that incorporate these Unisoc chipsets. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with the vector indicating local access (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), but high impact on availability (A:H). There are no known exploits in the wild, and no patches have been linked in the provided data, suggesting that mitigation may require vendor firmware or driver updates. The vulnerability is significant because kernel-level crashes can disrupt device operation and potentially be leveraged as part of a broader attack chain, although exploitation requires local access and some privileges.

Potential Impact

For European organizations, the impact of CVE-2022-39105 primarily concerns devices using affected Unisoc chipsets running Android 10 to 12. These chipsets are commonly found in budget and mid-range smartphones and IoT devices. A local attacker or malicious application with limited privileges could exploit this vulnerability to cause kernel crashes, leading to denial of service conditions on affected devices. This could disrupt business operations relying on mobile communications or IoT infrastructure, especially in sectors where device availability is critical, such as logistics, healthcare, or manufacturing. While the vulnerability does not directly compromise confidentiality or integrity, repeated crashes or instability could degrade user trust and device reliability. Additionally, in environments where devices are used for secure communications or critical monitoring, availability loss could have operational consequences. The requirement for local access and low privileges limits remote exploitation risk but does not eliminate insider threats or risks from malicious apps installed on devices. The absence of known exploits reduces immediate risk but does not preclude future exploitation. Organizations with large deployments of affected devices should consider this vulnerability in their risk assessments and patch management strategies.

Mitigation Recommendations

To mitigate CVE-2022-39105, European organizations should: 1) Identify and inventory all devices using Unisoc chipsets listed in the vulnerability, focusing on Android 10, 11, and 12 versions. 2) Engage with device manufacturers and Unisoc to obtain firmware or driver updates that address the integer overflow and apply patches promptly once available. 3) Implement strict application control policies to limit installation of untrusted or unnecessary apps that could exploit local vulnerabilities. 4) Employ mobile device management (MDM) solutions to monitor device health and detect abnormal crashes or kernel panics indicative of exploitation attempts. 5) Educate users about the risks of installing apps from untrusted sources and the importance of applying OS updates. 6) For critical deployments, consider network segmentation and access controls to reduce the risk of local attackers gaining access to devices. 7) Monitor security advisories from Unisoc, Android, and relevant vendors for updates or exploit reports. Since no patches are currently linked, organizations should prioritize vendor engagement and consider temporary compensating controls such as restricting local access to devices and enforcing least privilege principles on user accounts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec67d

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 11:12:28 AM

Last updated: 7/30/2025, 7:51:25 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats