Skip to main content

CVE-2022-39112: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Medium
VulnerabilityCVE-2022-39112cvecve-2022-39112cwe-862
Published: Fri Oct 14 2022 (10/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In Music service, there is a missing permission check. This could lead to local denial of service in Music service with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 07/06/2025, 11:56:39 UTC

Technical Analysis

CVE-2022-39112 is a medium severity vulnerability identified in various Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple others, primarily affecting devices running Android 10 and Android 11. The vulnerability stems from a missing authorization check (CWE-862) within the Music service component of the affected devices. Specifically, the Music service fails to properly verify permissions before allowing certain operations, which can be exploited locally by an attacker with limited privileges. This flaw does not require additional execution privileges or user interaction to trigger. The consequence of exploiting this vulnerability is a local denial of service (DoS) condition within the Music service, potentially causing the service to crash or become unresponsive, thereby degrading user experience or impacting dependent system components. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with attack vector classified as local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting availability only (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, and no patches have been linked or published yet by the vendor. The vulnerability was reserved in early September 2022 and published in October 2022. The affected chipsets are commonly used in budget and mid-range smartphones, especially in markets where Unisoc SoCs are prevalent. The missing authorization check indicates a design or implementation oversight in the access control mechanisms of the Music service, which could be leveraged by malicious local applications or users to disrupt service availability.

Potential Impact

For European organizations, the impact of CVE-2022-39112 is primarily related to service availability on devices using the affected Unisoc chipsets. While the vulnerability does not compromise confidentiality or integrity, a local denial of service in the Music service could affect user productivity and device reliability, especially in environments where mobile devices are used for critical communication or multimedia functions. Enterprises relying on mobile device management (MDM) or Bring Your Own Device (BYOD) policies that include devices with these chipsets may face increased support costs and user dissatisfaction. Although the attack requires local access and low privileges, it could be exploited by malicious apps or insiders to degrade device functionality. Given that the vulnerability does not allow privilege escalation or remote exploitation, the risk to core enterprise infrastructure is limited. However, organizations in sectors with high mobile device usage, such as telecommunications, media, and customer service, may experience operational disruptions if affected devices are widely deployed. The absence of known exploits reduces immediate risk, but the lack of patches means the vulnerability remains a latent threat.

Mitigation Recommendations

To mitigate CVE-2022-39112, European organizations should first identify devices using the affected Unisoc chipsets running Android 10 or 11 within their environment. Since no official patches are currently available, organizations should: 1) Restrict installation of untrusted or unnecessary local applications to reduce the risk of local exploitation. 2) Employ mobile device management (MDM) solutions to enforce application whitelisting and monitor for anomalous app behavior targeting the Music service. 3) Educate users about the risks of installing apps from unofficial sources that could exploit local vulnerabilities. 4) Monitor vendor communications closely for any forthcoming patches or firmware updates from device manufacturers or Unisoc. 5) Consider upgrading affected devices to newer hardware or software versions where the vulnerability is addressed. 6) Implement runtime protection or endpoint detection solutions capable of identifying abnormal process crashes or service disruptions related to the Music service. These steps go beyond generic advice by focusing on controlling local application execution and proactive device inventory management to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec714

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 11:56:39 AM

Last updated: 7/30/2025, 8:45:54 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats