Skip to main content

CVE-2022-39117: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

High
VulnerabilityCVE-2022-39117cvecve-2022-39117cwe-862
Published: Fri Oct 14 2022 (10/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In messaging service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 07/06/2025, 11:57:53 UTC

Technical Analysis

CVE-2022-39117 is a high-severity vulnerability identified in multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and various T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). These chipsets are integrated into Android devices running versions 10, 11, and 12. The vulnerability stems from a missing authorization check within the messaging service component of the affected devices. Specifically, the messaging service fails to enforce proper permission validation, allowing an unprivileged local attacker to access sensitive information without requiring additional execution privileges, user interaction, or authentication. This flaw is categorized under CWE-862 (Missing Authorization), indicating that the system does not adequately verify whether a subject is authorized to perform a requested operation. The CVSS v3.1 base score of 8.1 reflects the high impact on confidentiality and integrity, with an attack vector limited to adjacent network or local access (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the sensitive nature of messaging data and the widespread use of affected chipsets in budget and mid-range smartphones, particularly in emerging markets. The absence of a patch link suggests that mitigation may rely on vendor updates or device manufacturer firmware upgrades, which may not be uniformly available or timely across all affected devices.

Potential Impact

For European organizations, the impact of CVE-2022-39117 can be substantial, especially for enterprises and government entities relying on mobile devices powered by Unisoc chipsets. The vulnerability allows local attackers—potentially malicious insiders or individuals with physical access—to extract sensitive messaging information without elevated privileges. This compromises confidentiality and integrity of communications, potentially exposing personal data, corporate secrets, or authentication tokens transmitted via messaging apps. Given the increasing use of mobile devices for secure communications and multi-factor authentication, exploitation could facilitate further lateral attacks or social engineering campaigns. The lack of required user interaction lowers the barrier for exploitation. Although the vulnerability does not affect availability, the breach of confidentiality and integrity can lead to reputational damage, regulatory non-compliance under GDPR, and financial losses. The impact is heightened in sectors with stringent data protection requirements, such as finance, healthcare, and public administration. Additionally, the fragmented Android ecosystem and varying update policies may delay remediation, prolonging exposure.

Mitigation Recommendations

Mitigation should focus on a multi-layered approach tailored to the specific challenges of this vulnerability: 1) Device Inventory and Assessment: Identify all devices using affected Unisoc chipsets and Android versions 10-12 within the organization. 2) Firmware and OS Updates: Coordinate with device manufacturers and Unisoc to obtain and deploy firmware or OS patches addressing the missing authorization check. Where official patches are unavailable, consider upgrading to newer devices or Android versions not affected by this vulnerability. 3) Access Controls: Enforce strict physical security policies to prevent unauthorized local access to devices, including device encryption and strong lock screen authentication. 4) Application Hardening: Limit the use of messaging applications that may be vulnerable or implement additional app-level encryption and authentication to protect sensitive communications. 5) Monitoring and Incident Response: Implement endpoint detection capabilities to identify unusual local access patterns or attempts to exploit messaging services. 6) User Awareness: Educate users about the risks of leaving devices unattended and the importance of applying updates promptly. 7) Network Segmentation: Restrict network access to sensitive devices to reduce the risk of local exploitation via adjacent networks. These practical steps go beyond generic advice by emphasizing device-specific inventory, vendor coordination, and layered defenses tailored to the vulnerability's local attack vector and missing authorization nature.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec71e

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 11:57:53 AM

Last updated: 8/17/2025, 1:06:01 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats