CVE-2022-39112: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
In Music service, there is a missing permission check. This could lead to local denial of service in Music service with no additional execution privileges needed.
AI Analysis
Technical Summary
CVE-2022-39112 is a medium severity vulnerability identified in various Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple others, primarily affecting devices running Android 10 and Android 11. The vulnerability stems from a missing authorization check (CWE-862) within the Music service component of the affected devices. Specifically, the Music service fails to properly verify permissions before allowing certain operations, which can be exploited locally by an attacker with limited privileges. This flaw does not require additional execution privileges or user interaction to trigger. The consequence of exploiting this vulnerability is a local denial of service (DoS) condition within the Music service, potentially causing the service to crash or become unresponsive, thereby degrading user experience or impacting dependent system components. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with attack vector classified as local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting availability only (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, and no patches have been linked or published yet by the vendor. The vulnerability was reserved in early September 2022 and published in October 2022. The affected chipsets are commonly used in budget and mid-range smartphones, especially in markets where Unisoc SoCs are prevalent. The missing authorization check indicates a design or implementation oversight in the access control mechanisms of the Music service, which could be leveraged by malicious local applications or users to disrupt service availability.
Potential Impact
For European organizations, the impact of CVE-2022-39112 is primarily related to service availability on devices using the affected Unisoc chipsets. While the vulnerability does not compromise confidentiality or integrity, a local denial of service in the Music service could affect user productivity and device reliability, especially in environments where mobile devices are used for critical communication or multimedia functions. Enterprises relying on mobile device management (MDM) or Bring Your Own Device (BYOD) policies that include devices with these chipsets may face increased support costs and user dissatisfaction. Although the attack requires local access and low privileges, it could be exploited by malicious apps or insiders to degrade device functionality. Given that the vulnerability does not allow privilege escalation or remote exploitation, the risk to core enterprise infrastructure is limited. However, organizations in sectors with high mobile device usage, such as telecommunications, media, and customer service, may experience operational disruptions if affected devices are widely deployed. The absence of known exploits reduces immediate risk, but the lack of patches means the vulnerability remains a latent threat.
Mitigation Recommendations
To mitigate CVE-2022-39112, European organizations should first identify devices using the affected Unisoc chipsets running Android 10 or 11 within their environment. Since no official patches are currently available, organizations should: 1) Restrict installation of untrusted or unnecessary local applications to reduce the risk of local exploitation. 2) Employ mobile device management (MDM) solutions to enforce application whitelisting and monitor for anomalous app behavior targeting the Music service. 3) Educate users about the risks of installing apps from unofficial sources that could exploit local vulnerabilities. 4) Monitor vendor communications closely for any forthcoming patches or firmware updates from device manufacturers or Unisoc. 5) Consider upgrading affected devices to newer hardware or software versions where the vulnerability is addressed. 6) Implement runtime protection or endpoint detection solutions capable of identifying abnormal process crashes or service disruptions related to the Music service. These steps go beyond generic advice by focusing on controlling local application execution and proactive device inventory management to reduce exposure.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Poland, Netherlands
CVE-2022-39112: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
Description
In Music service, there is a missing permission check. This could lead to local denial of service in Music service with no additional execution privileges needed.
AI-Powered Analysis
Technical Analysis
CVE-2022-39112 is a medium severity vulnerability identified in various Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple others, primarily affecting devices running Android 10 and Android 11. The vulnerability stems from a missing authorization check (CWE-862) within the Music service component of the affected devices. Specifically, the Music service fails to properly verify permissions before allowing certain operations, which can be exploited locally by an attacker with limited privileges. This flaw does not require additional execution privileges or user interaction to trigger. The consequence of exploiting this vulnerability is a local denial of service (DoS) condition within the Music service, potentially causing the service to crash or become unresponsive, thereby degrading user experience or impacting dependent system components. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with attack vector classified as local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting availability only (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, and no patches have been linked or published yet by the vendor. The vulnerability was reserved in early September 2022 and published in October 2022. The affected chipsets are commonly used in budget and mid-range smartphones, especially in markets where Unisoc SoCs are prevalent. The missing authorization check indicates a design or implementation oversight in the access control mechanisms of the Music service, which could be leveraged by malicious local applications or users to disrupt service availability.
Potential Impact
For European organizations, the impact of CVE-2022-39112 is primarily related to service availability on devices using the affected Unisoc chipsets. While the vulnerability does not compromise confidentiality or integrity, a local denial of service in the Music service could affect user productivity and device reliability, especially in environments where mobile devices are used for critical communication or multimedia functions. Enterprises relying on mobile device management (MDM) or Bring Your Own Device (BYOD) policies that include devices with these chipsets may face increased support costs and user dissatisfaction. Although the attack requires local access and low privileges, it could be exploited by malicious apps or insiders to degrade device functionality. Given that the vulnerability does not allow privilege escalation or remote exploitation, the risk to core enterprise infrastructure is limited. However, organizations in sectors with high mobile device usage, such as telecommunications, media, and customer service, may experience operational disruptions if affected devices are widely deployed. The absence of known exploits reduces immediate risk, but the lack of patches means the vulnerability remains a latent threat.
Mitigation Recommendations
To mitigate CVE-2022-39112, European organizations should first identify devices using the affected Unisoc chipsets running Android 10 or 11 within their environment. Since no official patches are currently available, organizations should: 1) Restrict installation of untrusted or unnecessary local applications to reduce the risk of local exploitation. 2) Employ mobile device management (MDM) solutions to enforce application whitelisting and monitor for anomalous app behavior targeting the Music service. 3) Educate users about the risks of installing apps from unofficial sources that could exploit local vulnerabilities. 4) Monitor vendor communications closely for any forthcoming patches or firmware updates from device manufacturers or Unisoc. 5) Consider upgrading affected devices to newer hardware or software versions where the vulnerability is addressed. 6) Implement runtime protection or endpoint detection solutions capable of identifying abnormal process crashes or service disruptions related to the Music service. These steps go beyond generic advice by focusing on controlling local application execution and proactive device inventory management to reduce exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-09-01T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec714
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 11:56:39 AM
Last updated: 7/30/2025, 8:45:54 AM
Views: 10
Related Threats
CVE-2025-5048: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Autodesk AutoCAD
HighCVE-2025-5047: CWE-457: Use of Uninitialized Variable in Autodesk AutoCAD
HighCVE-2025-5046: CWE-125 Out-of-Bounds Read in Autodesk AutoCAD
HighCVE-2025-54466: CWE-94 Improper Control of Generation of Code ('Code Injection') in Apache Software Foundation Apache OFBiz
CriticalCVE-2025-9053: SQL Injection in projectworlds Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.