CVE-2022-39113: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
In Music service, there is a missing permission check. This could lead to local denial of service in Music service with no additional execution privileges needed.
AI Analysis
Technical Summary
CVE-2022-39113 is a medium-severity vulnerability affecting multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and various T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). These chipsets are integrated into devices running Android 10 and Android 11. The vulnerability arises from a missing authorization check in the Music service component of the affected systems. Specifically, the Music service fails to verify permissions properly before allowing certain operations, which constitutes a CWE-862 (Missing Authorization) weakness. This flaw can be exploited locally by an attacker with limited privileges (low privileges required) and does not require user interaction. Exploiting this vulnerability can cause a denial of service (DoS) condition in the Music service, disrupting its availability. The CVSS 3.1 base score is 5.5, reflecting a medium severity level, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits have been reported in the wild, and no patches are currently linked in the provided data. The vulnerability is specific to the Music service on devices using these Unisoc chipsets running Android 10 or 11, limiting the scope to affected devices and software versions. The flaw could be leveraged by malicious local applications or users to disrupt music playback or related services, potentially degrading user experience or device functionality.
Potential Impact
For European organizations, the impact of CVE-2022-39113 is primarily related to service availability on devices using affected Unisoc chipsets with Android 10 or 11. While the vulnerability does not compromise confidentiality or integrity, the denial of service in the Music service could affect user productivity and satisfaction, particularly in environments where multimedia services are critical, such as customer-facing kiosks, retail devices, or employee mobile devices used for communication and media. The local nature of the exploit means that attackers would need some level of access to the device, such as installing a malicious app or having physical access. This reduces the risk of widespread remote exploitation but does not eliminate insider threats or malware infections. Organizations relying on devices with these chipsets may experience disruptions in multimedia functionality, which could indirectly impact operational efficiency or user trust. Additionally, denial of service conditions could be used as a distraction or part of a multi-stage attack. Given the lack of known exploits in the wild, the immediate risk is moderate, but organizations should remain vigilant, especially those with large deployments of affected devices.
Mitigation Recommendations
To mitigate CVE-2022-39113, European organizations should: 1) Identify and inventory devices using affected Unisoc chipsets running Android 10 or 11, focusing on those with the vulnerable Music service. 2) Monitor vendor communications and security advisories from Unisoc and device manufacturers for patches or firmware updates addressing this vulnerability, and apply them promptly once available. 3) Restrict installation of untrusted or unauthorized applications on devices to reduce the risk of local exploitation by malicious apps. 4) Employ mobile device management (MDM) solutions to enforce security policies, including application whitelisting and permission controls, limiting the ability of apps to exploit missing authorization checks. 5) Educate users about the risks of installing apps from unverified sources and the importance of device security hygiene. 6) For critical environments, consider isolating or replacing devices with affected chipsets if patching is not feasible. 7) Implement monitoring for unusual device behavior or service disruptions that could indicate exploitation attempts. These steps go beyond generic advice by focusing on device inventory, vendor patch tracking, application control, and user awareness tailored to the specific nature of this local authorization vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2022-39113: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
Description
In Music service, there is a missing permission check. This could lead to local denial of service in Music service with no additional execution privileges needed.
AI-Powered Analysis
Technical Analysis
CVE-2022-39113 is a medium-severity vulnerability affecting multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and various T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). These chipsets are integrated into devices running Android 10 and Android 11. The vulnerability arises from a missing authorization check in the Music service component of the affected systems. Specifically, the Music service fails to verify permissions properly before allowing certain operations, which constitutes a CWE-862 (Missing Authorization) weakness. This flaw can be exploited locally by an attacker with limited privileges (low privileges required) and does not require user interaction. Exploiting this vulnerability can cause a denial of service (DoS) condition in the Music service, disrupting its availability. The CVSS 3.1 base score is 5.5, reflecting a medium severity level, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits have been reported in the wild, and no patches are currently linked in the provided data. The vulnerability is specific to the Music service on devices using these Unisoc chipsets running Android 10 or 11, limiting the scope to affected devices and software versions. The flaw could be leveraged by malicious local applications or users to disrupt music playback or related services, potentially degrading user experience or device functionality.
Potential Impact
For European organizations, the impact of CVE-2022-39113 is primarily related to service availability on devices using affected Unisoc chipsets with Android 10 or 11. While the vulnerability does not compromise confidentiality or integrity, the denial of service in the Music service could affect user productivity and satisfaction, particularly in environments where multimedia services are critical, such as customer-facing kiosks, retail devices, or employee mobile devices used for communication and media. The local nature of the exploit means that attackers would need some level of access to the device, such as installing a malicious app or having physical access. This reduces the risk of widespread remote exploitation but does not eliminate insider threats or malware infections. Organizations relying on devices with these chipsets may experience disruptions in multimedia functionality, which could indirectly impact operational efficiency or user trust. Additionally, denial of service conditions could be used as a distraction or part of a multi-stage attack. Given the lack of known exploits in the wild, the immediate risk is moderate, but organizations should remain vigilant, especially those with large deployments of affected devices.
Mitigation Recommendations
To mitigate CVE-2022-39113, European organizations should: 1) Identify and inventory devices using affected Unisoc chipsets running Android 10 or 11, focusing on those with the vulnerable Music service. 2) Monitor vendor communications and security advisories from Unisoc and device manufacturers for patches or firmware updates addressing this vulnerability, and apply them promptly once available. 3) Restrict installation of untrusted or unauthorized applications on devices to reduce the risk of local exploitation by malicious apps. 4) Employ mobile device management (MDM) solutions to enforce security policies, including application whitelisting and permission controls, limiting the ability of apps to exploit missing authorization checks. 5) Educate users about the risks of installing apps from unverified sources and the importance of device security hygiene. 6) For critical environments, consider isolating or replacing devices with affected chipsets if patching is not feasible. 7) Implement monitoring for unusual device behavior or service disruptions that could indicate exploitation attempts. These steps go beyond generic advice by focusing on device inventory, vendor patch tracking, application control, and user awareness tailored to the specific nature of this local authorization vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-09-01T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec6b1
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 11:27:29 AM
Last updated: 2/7/2026, 8:21:49 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.