Skip to main content

CVE-2022-39106: CWE-121 Stack Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Medium
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.

AI-Powered Analysis

AILast updated: 06/24/2025, 03:10:24 UTC

Technical Analysis

CVE-2022-39106 is a medium-severity vulnerability identified in the sensor driver of several Unisoc chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8000. These chipsets are commonly embedded in Android devices running versions 10, 11, and 12. The vulnerability arises from a missing bounds check in the sensor driver's code, leading to a potential out-of-bounds write, which is a form of stack overflow (CWE-121) and also relates to improper restriction of operations within memory bounds (CWE-787). This flaw can be exploited locally by an attacker with limited privileges (low privileges required) to cause a denial of service (DoS) by crashing the kernel, resulting in system instability or reboot. The CVSS v3.1 score is 5.5, reflecting a medium severity, with the attack vector being local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacting availability only (A:H) without affecting confidentiality or integrity. There are no known exploits in the wild as of the publication date, and no patches have been linked or published by the vendor yet. The vulnerability is specific to the sensor driver component of the kernel, which is critical for device hardware interaction, meaning exploitation could disrupt sensor functionality or cause system crashes but does not directly lead to remote code execution or data leakage.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in the potential for local denial of service on devices using affected Unisoc chipsets. This could affect mobile devices, IoT devices, or embedded systems relying on these chipsets, particularly those running Android 10 through 12. The denial of service could disrupt business operations dependent on mobile communications or sensor data, especially in sectors like manufacturing, logistics, healthcare, or critical infrastructure where sensor data integrity and device availability are vital. While the vulnerability does not allow remote exploitation or data compromise, the forced reboot or crash of devices could lead to operational downtime, loss of sensor data, and reduced device reliability. Given that exploitation requires local access and privileges, the risk is higher in environments where devices may be physically accessible or where untrusted applications could gain limited privileges. The absence of known exploits reduces immediate risk, but organizations should remain vigilant as attackers may develop exploits over time. The impact is more pronounced in environments with large deployments of affected devices, where mass disruption could occur if exploited.

Mitigation Recommendations

Organizations should implement the following specific mitigations: 1) Inventory and identify devices using Unisoc chipsets listed in the vulnerability to assess exposure. 2) Monitor vendor communications and security advisories from Unisoc and device manufacturers for patches or firmware updates addressing this issue, and prioritize timely deployment once available. 3) Restrict local access to devices, especially in sensitive environments, to prevent unprivileged users or malicious applications from exploiting the vulnerability. 4) Employ mobile device management (MDM) solutions to enforce application whitelisting and privilege restrictions, minimizing the risk of local privilege escalation. 5) For critical systems, consider network segmentation and device isolation to limit the impact of potential denial of service. 6) Implement monitoring and alerting for unusual device reboots or sensor failures that could indicate exploitation attempts. 7) Educate users about the risks of installing untrusted applications that might exploit local vulnerabilities. These measures go beyond generic advice by focusing on device-specific inventory, access control, and proactive monitoring tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf1548

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 3:10:24 AM

Last updated: 8/14/2025, 2:58:39 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats