Skip to main content

CVE-2022-39113: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Medium
VulnerabilityCVE-2022-39113cvecve-2022-39113cwe-862
Published: Fri Oct 14 2022 (10/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In Music service, there is a missing permission check. This could lead to local denial of service in Music service with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 07/06/2025, 11:27:29 UTC

Technical Analysis

CVE-2022-39113 is a medium-severity vulnerability affecting multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and various T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). These chipsets are integrated into devices running Android 10 and Android 11. The vulnerability arises from a missing authorization check in the Music service component of the affected systems. Specifically, the Music service fails to verify permissions properly before allowing certain operations, which constitutes a CWE-862 (Missing Authorization) weakness. This flaw can be exploited locally by an attacker with limited privileges (low privileges required) and does not require user interaction. Exploiting this vulnerability can cause a denial of service (DoS) condition in the Music service, disrupting its availability. The CVSS 3.1 base score is 5.5, reflecting a medium severity level, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits have been reported in the wild, and no patches are currently linked in the provided data. The vulnerability is specific to the Music service on devices using these Unisoc chipsets running Android 10 or 11, limiting the scope to affected devices and software versions. The flaw could be leveraged by malicious local applications or users to disrupt music playback or related services, potentially degrading user experience or device functionality.

Potential Impact

For European organizations, the impact of CVE-2022-39113 is primarily related to service availability on devices using affected Unisoc chipsets with Android 10 or 11. While the vulnerability does not compromise confidentiality or integrity, the denial of service in the Music service could affect user productivity and satisfaction, particularly in environments where multimedia services are critical, such as customer-facing kiosks, retail devices, or employee mobile devices used for communication and media. The local nature of the exploit means that attackers would need some level of access to the device, such as installing a malicious app or having physical access. This reduces the risk of widespread remote exploitation but does not eliminate insider threats or malware infections. Organizations relying on devices with these chipsets may experience disruptions in multimedia functionality, which could indirectly impact operational efficiency or user trust. Additionally, denial of service conditions could be used as a distraction or part of a multi-stage attack. Given the lack of known exploits in the wild, the immediate risk is moderate, but organizations should remain vigilant, especially those with large deployments of affected devices.

Mitigation Recommendations

To mitigate CVE-2022-39113, European organizations should: 1) Identify and inventory devices using affected Unisoc chipsets running Android 10 or 11, focusing on those with the vulnerable Music service. 2) Monitor vendor communications and security advisories from Unisoc and device manufacturers for patches or firmware updates addressing this vulnerability, and apply them promptly once available. 3) Restrict installation of untrusted or unauthorized applications on devices to reduce the risk of local exploitation by malicious apps. 4) Employ mobile device management (MDM) solutions to enforce security policies, including application whitelisting and permission controls, limiting the ability of apps to exploit missing authorization checks. 5) Educate users about the risks of installing apps from unverified sources and the importance of device security hygiene. 6) For critical environments, consider isolating or replacing devices with affected chipsets if patching is not feasible. 7) Implement monitoring for unusual device behavior or service disruptions that could indicate exploitation attempts. These steps go beyond generic advice by focusing on device inventory, vendor patch tracking, application control, and user awareness tailored to the specific nature of this local authorization vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec6b1

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 11:27:29 AM

Last updated: 8/7/2025, 6:50:04 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats