Skip to main content

CVE-2022-39121: CWE-120 Buffer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Medium
VulnerabilityCVE-2022-39121cvecve-2022-39121cwe-120
Published: Fri Oct 14 2022 (10/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.

AI-Powered Analysis

AILast updated: 07/06/2025, 14:24:49 UTC

Technical Analysis

CVE-2022-39121 is a medium severity vulnerability identified in sensor drivers used in multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8000. These chipsets are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability stems from a classic CWE-120 buffer overflow condition caused by a missing bounds check in the sensor driver code. Specifically, the driver fails to properly validate input or data length before writing to a buffer, leading to an out-of-bounds write. This flaw can be exploited locally by an attacker with limited privileges (low privileges required) and does not require user interaction. Successful exploitation results in a denial of service (DoS) condition by crashing the kernel or causing instability, impacting system availability. The CVSS v3.1 base score is 5.5, reflecting medium severity, with an attack vector of local access, low attack complexity, and no confidentiality or integrity impact, but a high impact on availability. No known public exploits have been reported to date, and no patches have been linked, indicating that mitigation may require vendor updates or device firmware upgrades. The vulnerability is relevant to devices using the affected Unisoc chipsets, which are prevalent in budget and mid-range smartphones, particularly in emerging markets and some European regions where these devices are sold. The kernel-level nature of the flaw means exploitation could lead to system crashes or forced reboots, disrupting device functionality and user experience.

Potential Impact

For European organizations, the impact of CVE-2022-39121 primarily concerns availability disruption on devices using affected Unisoc chipsets. Enterprises that deploy Android devices with these chipsets for mobile workforce or IoT applications could face operational interruptions if attackers exploit this vulnerability to cause kernel crashes. Although the vulnerability does not compromise confidentiality or integrity, denial of service at the kernel level can lead to loss of productivity, potential data loss during crashes, and increased support costs. Organizations relying on mobile devices for critical communications or field operations may experience degraded service reliability. Additionally, the local attack vector means that physical or local access to the device is required, limiting remote exploitation risks but raising concerns in environments where devices are shared or accessible by untrusted users. The absence of known exploits reduces immediate risk, but the medium severity score and kernel-level impact warrant proactive mitigation to prevent potential exploitation, especially in sectors with sensitive operational continuity requirements such as healthcare, manufacturing, and public services.

Mitigation Recommendations

To mitigate CVE-2022-39121 effectively, European organizations should: 1) Inventory and identify all devices using affected Unisoc chipsets and Android versions 10 through 12 within their environment. 2) Engage with device manufacturers and Unisoc to obtain firmware or driver updates that address the buffer overflow vulnerability. Promptly apply these updates once available. 3) Implement strict device access controls to limit local access to trusted personnel only, reducing the risk of local exploitation. 4) Employ mobile device management (MDM) solutions to monitor device health and detect abnormal reboots or crashes indicative of exploitation attempts. 5) Educate users on the risks of installing untrusted applications or granting unnecessary permissions that could facilitate local attacks. 6) For critical deployments, consider network segmentation and endpoint protection to isolate vulnerable devices and reduce attack surface. 7) Maintain regular backups and incident response plans to quickly recover from potential denial of service incidents. These steps go beyond generic advice by focusing on device-specific inventory, vendor coordination, and operational controls tailored to the local attack vector and kernel-level impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec921

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 2:24:49 PM

Last updated: 7/30/2025, 11:44:38 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats