Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-39117: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

0
High
VulnerabilityCVE-2022-39117cvecve-2022-39117cwe-862
Published: Fri Oct 14 2022 (10/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In messaging service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 07/06/2025, 11:57:53 UTC

Technical Analysis

CVE-2022-39117 is a high-severity vulnerability identified in multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and various T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). These chipsets are integrated into Android devices running versions 10, 11, and 12. The vulnerability stems from a missing authorization check within the messaging service component of the affected devices. Specifically, the messaging service fails to enforce proper permission validation, allowing an unprivileged local attacker to access sensitive information without requiring additional execution privileges, user interaction, or authentication. This flaw is categorized under CWE-862 (Missing Authorization), indicating that the system does not adequately verify whether a subject is authorized to perform a requested operation. The CVSS v3.1 base score of 8.1 reflects the high impact on confidentiality and integrity, with an attack vector limited to adjacent network or local access (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the sensitive nature of messaging data and the widespread use of affected chipsets in budget and mid-range smartphones, particularly in emerging markets. The absence of a patch link suggests that mitigation may rely on vendor updates or device manufacturer firmware upgrades, which may not be uniformly available or timely across all affected devices.

Potential Impact

For European organizations, the impact of CVE-2022-39117 can be substantial, especially for enterprises and government entities relying on mobile devices powered by Unisoc chipsets. The vulnerability allows local attackers—potentially malicious insiders or individuals with physical access—to extract sensitive messaging information without elevated privileges. This compromises confidentiality and integrity of communications, potentially exposing personal data, corporate secrets, or authentication tokens transmitted via messaging apps. Given the increasing use of mobile devices for secure communications and multi-factor authentication, exploitation could facilitate further lateral attacks or social engineering campaigns. The lack of required user interaction lowers the barrier for exploitation. Although the vulnerability does not affect availability, the breach of confidentiality and integrity can lead to reputational damage, regulatory non-compliance under GDPR, and financial losses. The impact is heightened in sectors with stringent data protection requirements, such as finance, healthcare, and public administration. Additionally, the fragmented Android ecosystem and varying update policies may delay remediation, prolonging exposure.

Mitigation Recommendations

Mitigation should focus on a multi-layered approach tailored to the specific challenges of this vulnerability: 1) Device Inventory and Assessment: Identify all devices using affected Unisoc chipsets and Android versions 10-12 within the organization. 2) Firmware and OS Updates: Coordinate with device manufacturers and Unisoc to obtain and deploy firmware or OS patches addressing the missing authorization check. Where official patches are unavailable, consider upgrading to newer devices or Android versions not affected by this vulnerability. 3) Access Controls: Enforce strict physical security policies to prevent unauthorized local access to devices, including device encryption and strong lock screen authentication. 4) Application Hardening: Limit the use of messaging applications that may be vulnerable or implement additional app-level encryption and authentication to protect sensitive communications. 5) Monitoring and Incident Response: Implement endpoint detection capabilities to identify unusual local access patterns or attempts to exploit messaging services. 6) User Awareness: Educate users about the risks of leaving devices unattended and the importance of applying updates promptly. 7) Network Segmentation: Restrict network access to sensitive devices to reduce the risk of local exploitation via adjacent networks. These practical steps go beyond generic advice by emphasizing device-specific inventory, vendor coordination, and layered defenses tailored to the vulnerability's local attack vector and missing authorization nature.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec71e

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 11:57:53 AM

Last updated: 2/4/2026, 3:45:00 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats