Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-39112: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

0
Medium
VulnerabilityCVE-2022-39112cvecve-2022-39112cwe-862
Published: Fri Oct 14 2022 (10/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In Music service, there is a missing permission check. This could lead to local denial of service in Music service with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 07/06/2025, 11:56:39 UTC

Technical Analysis

CVE-2022-39112 is a medium severity vulnerability identified in various Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple others, primarily affecting devices running Android 10 and Android 11. The vulnerability stems from a missing authorization check (CWE-862) within the Music service component of the affected devices. Specifically, the Music service fails to properly verify permissions before allowing certain operations, which can be exploited locally by an attacker with limited privileges. This flaw does not require additional execution privileges or user interaction to trigger. The consequence of exploiting this vulnerability is a local denial of service (DoS) condition within the Music service, potentially causing the service to crash or become unresponsive, thereby degrading user experience or impacting dependent system components. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with attack vector classified as local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting availability only (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, and no patches have been linked or published yet by the vendor. The vulnerability was reserved in early September 2022 and published in October 2022. The affected chipsets are commonly used in budget and mid-range smartphones, especially in markets where Unisoc SoCs are prevalent. The missing authorization check indicates a design or implementation oversight in the access control mechanisms of the Music service, which could be leveraged by malicious local applications or users to disrupt service availability.

Potential Impact

For European organizations, the impact of CVE-2022-39112 is primarily related to service availability on devices using the affected Unisoc chipsets. While the vulnerability does not compromise confidentiality or integrity, a local denial of service in the Music service could affect user productivity and device reliability, especially in environments where mobile devices are used for critical communication or multimedia functions. Enterprises relying on mobile device management (MDM) or Bring Your Own Device (BYOD) policies that include devices with these chipsets may face increased support costs and user dissatisfaction. Although the attack requires local access and low privileges, it could be exploited by malicious apps or insiders to degrade device functionality. Given that the vulnerability does not allow privilege escalation or remote exploitation, the risk to core enterprise infrastructure is limited. However, organizations in sectors with high mobile device usage, such as telecommunications, media, and customer service, may experience operational disruptions if affected devices are widely deployed. The absence of known exploits reduces immediate risk, but the lack of patches means the vulnerability remains a latent threat.

Mitigation Recommendations

To mitigate CVE-2022-39112, European organizations should first identify devices using the affected Unisoc chipsets running Android 10 or 11 within their environment. Since no official patches are currently available, organizations should: 1) Restrict installation of untrusted or unnecessary local applications to reduce the risk of local exploitation. 2) Employ mobile device management (MDM) solutions to enforce application whitelisting and monitor for anomalous app behavior targeting the Music service. 3) Educate users about the risks of installing apps from unofficial sources that could exploit local vulnerabilities. 4) Monitor vendor communications closely for any forthcoming patches or firmware updates from device manufacturers or Unisoc. 5) Consider upgrading affected devices to newer hardware or software versions where the vulnerability is addressed. 6) Implement runtime protection or endpoint detection solutions capable of identifying abnormal process crashes or service disruptions related to the Music service. These steps go beyond generic advice by focusing on controlling local application execution and proactive device inventory management to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec714

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 11:56:39 AM

Last updated: 2/7/2026, 9:17:59 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats