CVE-2022-39121: CWE-120 Buffer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
AI Analysis
Technical Summary
CVE-2022-39121 is a medium severity vulnerability identified in sensor drivers used in multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8000. These chipsets are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability stems from a classic CWE-120 buffer overflow condition caused by a missing bounds check in the sensor driver code. Specifically, the driver fails to properly validate input or data length before writing to a buffer, leading to an out-of-bounds write. This flaw can be exploited locally by an attacker with limited privileges (low privileges required) and does not require user interaction. Successful exploitation results in a denial of service (DoS) condition by crashing the kernel or causing instability, impacting system availability. The CVSS v3.1 base score is 5.5, reflecting medium severity, with an attack vector of local access, low attack complexity, and no confidentiality or integrity impact, but a high impact on availability. No known public exploits have been reported to date, and no patches have been linked, indicating that mitigation may require vendor updates or device firmware upgrades. The vulnerability is relevant to devices using the affected Unisoc chipsets, which are prevalent in budget and mid-range smartphones, particularly in emerging markets and some European regions where these devices are sold. The kernel-level nature of the flaw means exploitation could lead to system crashes or forced reboots, disrupting device functionality and user experience.
Potential Impact
For European organizations, the impact of CVE-2022-39121 primarily concerns availability disruption on devices using affected Unisoc chipsets. Enterprises that deploy Android devices with these chipsets for mobile workforce or IoT applications could face operational interruptions if attackers exploit this vulnerability to cause kernel crashes. Although the vulnerability does not compromise confidentiality or integrity, denial of service at the kernel level can lead to loss of productivity, potential data loss during crashes, and increased support costs. Organizations relying on mobile devices for critical communications or field operations may experience degraded service reliability. Additionally, the local attack vector means that physical or local access to the device is required, limiting remote exploitation risks but raising concerns in environments where devices are shared or accessible by untrusted users. The absence of known exploits reduces immediate risk, but the medium severity score and kernel-level impact warrant proactive mitigation to prevent potential exploitation, especially in sectors with sensitive operational continuity requirements such as healthcare, manufacturing, and public services.
Mitigation Recommendations
To mitigate CVE-2022-39121 effectively, European organizations should: 1) Inventory and identify all devices using affected Unisoc chipsets and Android versions 10 through 12 within their environment. 2) Engage with device manufacturers and Unisoc to obtain firmware or driver updates that address the buffer overflow vulnerability. Promptly apply these updates once available. 3) Implement strict device access controls to limit local access to trusted personnel only, reducing the risk of local exploitation. 4) Employ mobile device management (MDM) solutions to monitor device health and detect abnormal reboots or crashes indicative of exploitation attempts. 5) Educate users on the risks of installing untrusted applications or granting unnecessary permissions that could facilitate local attacks. 6) For critical deployments, consider network segmentation and endpoint protection to isolate vulnerable devices and reduce attack surface. 7) Maintain regular backups and incident response plans to quickly recover from potential denial of service incidents. These steps go beyond generic advice by focusing on device-specific inventory, vendor coordination, and operational controls tailored to the local attack vector and kernel-level impact.
Affected Countries
Germany, France, Italy, Spain, Poland, United Kingdom, Netherlands, Belgium, Sweden, Czech Republic
CVE-2022-39121: CWE-120 Buffer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
Description
In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
AI-Powered Analysis
Technical Analysis
CVE-2022-39121 is a medium severity vulnerability identified in sensor drivers used in multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8000. These chipsets are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability stems from a classic CWE-120 buffer overflow condition caused by a missing bounds check in the sensor driver code. Specifically, the driver fails to properly validate input or data length before writing to a buffer, leading to an out-of-bounds write. This flaw can be exploited locally by an attacker with limited privileges (low privileges required) and does not require user interaction. Successful exploitation results in a denial of service (DoS) condition by crashing the kernel or causing instability, impacting system availability. The CVSS v3.1 base score is 5.5, reflecting medium severity, with an attack vector of local access, low attack complexity, and no confidentiality or integrity impact, but a high impact on availability. No known public exploits have been reported to date, and no patches have been linked, indicating that mitigation may require vendor updates or device firmware upgrades. The vulnerability is relevant to devices using the affected Unisoc chipsets, which are prevalent in budget and mid-range smartphones, particularly in emerging markets and some European regions where these devices are sold. The kernel-level nature of the flaw means exploitation could lead to system crashes or forced reboots, disrupting device functionality and user experience.
Potential Impact
For European organizations, the impact of CVE-2022-39121 primarily concerns availability disruption on devices using affected Unisoc chipsets. Enterprises that deploy Android devices with these chipsets for mobile workforce or IoT applications could face operational interruptions if attackers exploit this vulnerability to cause kernel crashes. Although the vulnerability does not compromise confidentiality or integrity, denial of service at the kernel level can lead to loss of productivity, potential data loss during crashes, and increased support costs. Organizations relying on mobile devices for critical communications or field operations may experience degraded service reliability. Additionally, the local attack vector means that physical or local access to the device is required, limiting remote exploitation risks but raising concerns in environments where devices are shared or accessible by untrusted users. The absence of known exploits reduces immediate risk, but the medium severity score and kernel-level impact warrant proactive mitigation to prevent potential exploitation, especially in sectors with sensitive operational continuity requirements such as healthcare, manufacturing, and public services.
Mitigation Recommendations
To mitigate CVE-2022-39121 effectively, European organizations should: 1) Inventory and identify all devices using affected Unisoc chipsets and Android versions 10 through 12 within their environment. 2) Engage with device manufacturers and Unisoc to obtain firmware or driver updates that address the buffer overflow vulnerability. Promptly apply these updates once available. 3) Implement strict device access controls to limit local access to trusted personnel only, reducing the risk of local exploitation. 4) Employ mobile device management (MDM) solutions to monitor device health and detect abnormal reboots or crashes indicative of exploitation attempts. 5) Educate users on the risks of installing untrusted applications or granting unnecessary permissions that could facilitate local attacks. 6) For critical deployments, consider network segmentation and endpoint protection to isolate vulnerable devices and reduce attack surface. 7) Maintain regular backups and incident response plans to quickly recover from potential denial of service incidents. These steps go beyond generic advice by focusing on device-specific inventory, vendor coordination, and operational controls tailored to the local attack vector and kernel-level impact.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-09-01T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec921
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 2:24:49 PM
Last updated: 2/4/2026, 11:35:29 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59818: Vulnerability in Zenitel TCIS-3+
CriticalCVE-2025-41085: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Apidog Apidog Web Platform
MediumDetecting and Monitoring OpenClaw (clawdbot, moltbot), (Tue, Feb 3rd)
MediumMalicious Script Delivering More Maliciousness, (Wed, Feb 4th)
MediumEclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.