Skip to main content

CVE-2022-39110: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

High
VulnerabilityCVE-2022-39110cvecve-2022-39110cwe-862
Published: Fri Oct 14 2022 (10/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In Music service, there is a missing permission check. This could lead to elevation of privilege in Music service with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 07/06/2025, 11:43:38 UTC

Technical Analysis

CVE-2022-39110 is a high-severity vulnerability identified in several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). These chipsets are integrated into devices running Android versions 10, 11, and 12. The vulnerability arises from a missing authorization check within the Music service component of the affected devices. Specifically, the service fails to verify permissions properly, allowing an attacker with limited privileges (low-level privileges) to elevate their privileges within the Music service without requiring additional execution privileges or user interaction. The CVSS v3.1 base score is 7.8, indicating a high severity level, with the vector string AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack requires local access (local vector), low attack complexity, and low privileges but no user interaction. The impact affects confidentiality, integrity, and availability at a high level. The vulnerability is categorized under CWE-862 (Missing Authorization), which typically involves insufficient permission checks leading to unauthorized access or actions. No public exploits are currently known in the wild, and no patches have been linked in the provided data, suggesting that mitigation may rely on vendor updates or workarounds. The affected chipsets are commonly used in budget and mid-range smartphones, especially in markets where Unisoc chipsets have significant penetration. The vulnerability could allow attackers to manipulate the Music service to gain unauthorized access or control, potentially leading to broader system compromise depending on the integration of the Music service with other system components.

Potential Impact

For European organizations, the impact of CVE-2022-39110 depends largely on the prevalence of devices using the affected Unisoc chipsets within their operational environment. Enterprises that provide mobile devices to employees or rely on BYOD (Bring Your Own Device) policies may face risks if these devices are compromised. The vulnerability allows local attackers to elevate privileges within the Music service, which could be leveraged to access sensitive data, manipulate media files, or potentially escalate further to compromise other system components. This could lead to data breaches, unauthorized data manipulation, or service disruptions. In sectors such as finance, healthcare, or critical infrastructure where mobile device security is paramount, exploitation could undermine confidentiality and integrity of sensitive information. Additionally, since the vulnerability affects Android 10 through 12, a wide range of devices remain vulnerable, increasing the attack surface. Although no known exploits are currently reported in the wild, the ease of exploitation (low complexity, no user interaction) suggests that attackers with local access could develop exploits rapidly. This is particularly concerning for organizations with less controlled mobile environments or those with employees using vulnerable devices in sensitive roles. The potential for availability impact also raises concerns for operational continuity if the Music service or related components are disrupted.

Mitigation Recommendations

1. Device Inventory and Assessment: Organizations should identify and inventory all mobile devices in use, focusing on those with Unisoc chipsets and running Android 10, 11, or 12. 2. Vendor Updates: Engage with device manufacturers and Unisoc to obtain firmware or OS patches addressing CVE-2022-39110. Apply updates promptly once available. 3. Restrict Local Access: Since the vulnerability requires local access, enforce strict physical and logical access controls on mobile devices, including strong lock screens, biometric authentication, and device encryption. 4. Mobile Device Management (MDM): Utilize MDM solutions to enforce security policies, restrict installation of untrusted applications, and monitor device behavior for anomalies. 5. Application Whitelisting and Sandboxing: Limit the ability of unauthorized applications to interact with the Music service or related system components. 6. User Awareness: Educate users about the risks of installing untrusted apps or granting unnecessary permissions that could facilitate local exploitation. 7. Network Segmentation: Limit the exposure of vulnerable devices to sensitive networks or data, reducing the impact of potential compromise. 8. Incident Response Preparedness: Develop and test incident response plans specific to mobile device compromise scenarios, including rapid isolation and remediation steps. 9. Alternative Device Provisioning: For high-risk roles, consider provisioning devices with chipsets not affected by this vulnerability or with verified security patches applied. 10. Monitor Security Advisories: Continuously monitor Unisoc, Android security bulletins, and CERT advisories for updates or exploit disclosures related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec6f7

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 11:43:38 AM

Last updated: 8/7/2025, 8:05:46 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats