CVE-2022-39122: CWE-120 Buffer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
AI Analysis
Technical Summary
CVE-2022-39122 is a medium-severity vulnerability identified in sensor drivers used in several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). These chipsets are integrated into devices running Android versions 10, 11, and 12. The vulnerability arises from a missing bounds check in the sensor driver code, leading to a potential out-of-bounds write condition, classified under CWE-120 (Classic Buffer Overflow). This flaw can be exploited locally by an attacker with limited privileges (low privileges required) and does not require user interaction. Successful exploitation results in a denial of service (DoS) condition at the kernel level, causing system instability or crashes. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with the attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, and no patches or fixes have been referenced in the provided data. The vulnerability's presence in kernel-level sensor drivers means that exploitation could disrupt critical device functions, potentially causing reboots or system hangs, impacting device reliability and user experience.
Potential Impact
For European organizations, the impact of CVE-2022-39122 primarily concerns mobile devices or embedded systems utilizing Unisoc chipsets running affected Android versions. The local denial of service at the kernel level could disrupt business operations relying on mobile communications, IoT devices, or specialized embedded hardware using these chipsets. While the vulnerability does not allow data theft or privilege escalation, the resulting system instability could lead to operational downtime, loss of productivity, and increased support costs. Industries with high reliance on mobile or embedded devices, such as telecommunications, manufacturing, logistics, and critical infrastructure sectors, may face increased risk if devices are deployed in sensitive environments. Additionally, the inability to maintain device availability could hinder incident response or emergency communications. Given the local attack vector and low privilege requirement, insider threats or malicious applications installed on devices could trigger the vulnerability, emphasizing the need for strict device management and application control policies.
Mitigation Recommendations
To mitigate CVE-2022-39122 effectively, European organizations should: 1) Identify and inventory all devices using affected Unisoc chipsets and Android versions 10, 11, or 12, focusing on mobile and embedded device fleets. 2) Engage with device manufacturers and Unisoc to obtain firmware or driver updates addressing the vulnerability; prioritize deployment of patches once available. 3) Implement strict application whitelisting and privilege management on affected devices to prevent untrusted or malicious local applications from exploiting the vulnerability. 4) Employ mobile device management (MDM) solutions to enforce security policies, monitor device health, and restrict installation of unauthorized software. 5) For critical systems, consider network segmentation and isolation to limit the impact of potential device failures caused by exploitation. 6) Educate users and administrators about the risk of local exploits and encourage vigilance against installing untrusted applications or granting unnecessary privileges. 7) Monitor device logs and system behavior for signs of instability or crashes that could indicate exploitation attempts. These steps go beyond generic advice by focusing on device-specific inventory, vendor coordination, and operational controls tailored to the local attack vector and kernel-level impact.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2022-39122: CWE-120 Buffer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
Description
In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
AI-Powered Analysis
Technical Analysis
CVE-2022-39122 is a medium-severity vulnerability identified in sensor drivers used in several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). These chipsets are integrated into devices running Android versions 10, 11, and 12. The vulnerability arises from a missing bounds check in the sensor driver code, leading to a potential out-of-bounds write condition, classified under CWE-120 (Classic Buffer Overflow). This flaw can be exploited locally by an attacker with limited privileges (low privileges required) and does not require user interaction. Successful exploitation results in a denial of service (DoS) condition at the kernel level, causing system instability or crashes. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with the attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, and no patches or fixes have been referenced in the provided data. The vulnerability's presence in kernel-level sensor drivers means that exploitation could disrupt critical device functions, potentially causing reboots or system hangs, impacting device reliability and user experience.
Potential Impact
For European organizations, the impact of CVE-2022-39122 primarily concerns mobile devices or embedded systems utilizing Unisoc chipsets running affected Android versions. The local denial of service at the kernel level could disrupt business operations relying on mobile communications, IoT devices, or specialized embedded hardware using these chipsets. While the vulnerability does not allow data theft or privilege escalation, the resulting system instability could lead to operational downtime, loss of productivity, and increased support costs. Industries with high reliance on mobile or embedded devices, such as telecommunications, manufacturing, logistics, and critical infrastructure sectors, may face increased risk if devices are deployed in sensitive environments. Additionally, the inability to maintain device availability could hinder incident response or emergency communications. Given the local attack vector and low privilege requirement, insider threats or malicious applications installed on devices could trigger the vulnerability, emphasizing the need for strict device management and application control policies.
Mitigation Recommendations
To mitigate CVE-2022-39122 effectively, European organizations should: 1) Identify and inventory all devices using affected Unisoc chipsets and Android versions 10, 11, or 12, focusing on mobile and embedded device fleets. 2) Engage with device manufacturers and Unisoc to obtain firmware or driver updates addressing the vulnerability; prioritize deployment of patches once available. 3) Implement strict application whitelisting and privilege management on affected devices to prevent untrusted or malicious local applications from exploiting the vulnerability. 4) Employ mobile device management (MDM) solutions to enforce security policies, monitor device health, and restrict installation of unauthorized software. 5) For critical systems, consider network segmentation and isolation to limit the impact of potential device failures caused by exploitation. 6) Educate users and administrators about the risk of local exploits and encourage vigilance against installing untrusted applications or granting unnecessary privileges. 7) Monitor device logs and system behavior for signs of instability or crashes that could indicate exploitation attempts. These steps go beyond generic advice by focusing on device-specific inventory, vendor coordination, and operational controls tailored to the local attack vector and kernel-level impact.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-09-01T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec929
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 2:25:28 PM
Last updated: 8/11/2025, 2:28:29 PM
Views: 11
Related Threats
CVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumCVE-2025-8418: CWE-862 Missing Authorization in bplugins B Slider- Gutenberg Slider Block for WP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.