Skip to main content

CVE-2022-39124: CWE-400 Uncontrolled Resource Consumption in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Medium
VulnerabilityCVE-2022-39124cvecve-2022-39124cwe-400
Published: Fri Oct 14 2022 (10/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.

AI-Powered Analysis

AILast updated: 07/06/2025, 14:25:54 UTC

Technical Analysis

CVE-2022-39124 is a medium-severity vulnerability identified in the sensor driver component of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models such as T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8000. These chipsets are commonly integrated into Android devices running versions 10, 11, and 12. The vulnerability stems from a missing bounds check in the sensor driver, which leads to an out-of-bounds write condition. This flaw falls under CWE-400, which relates to uncontrolled resource consumption. The consequence of this vulnerability is a potential local denial of service (DoS) condition at the kernel level. The CVSS 3.1 base score is 5.5, reflecting a medium severity level, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), low privileges (PR:L), no user interaction (UI:N), and impacts only availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability could be exploited by a local attacker or malicious application with limited privileges to trigger a kernel crash or resource exhaustion, causing device instability or reboot loops. This could disrupt device availability and user experience but does not directly expose sensitive data or allow privilege escalation.

Potential Impact

For European organizations, the impact of CVE-2022-39124 primarily concerns operational disruption rather than data breach or espionage. Devices using affected Unisoc chipsets may experience kernel crashes or denial of service if exploited locally, potentially affecting mobile workforce productivity, especially in sectors relying on mobile communications and field operations. Critical infrastructure or services using Android devices with these chipsets could face temporary outages or degraded service. Since the vulnerability requires local access and low privileges, the risk is higher in environments where endpoint security controls are weak or where users might install untrusted applications. The lack of confidentiality or integrity impact reduces the risk of data compromise, but availability interruptions could still have cascading effects in sectors like healthcare, logistics, or public safety. Additionally, the widespread use of Android devices in Europe means that consumer devices could also be affected, potentially leading to increased support costs and reputational damage for service providers and manufacturers.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Identify and inventory all Android devices using Unisoc chipsets listed in the advisory, focusing on those running Android 10, 11, or 12. 2) Monitor vendor communications closely for official patches or firmware updates from device manufacturers or Unisoc and apply them promptly once available. 3) Enforce strict application control policies to prevent installation of untrusted or potentially malicious apps that could exploit local vulnerabilities. 4) Employ mobile device management (MDM) solutions to monitor device health and detect unusual kernel crashes or reboots indicative of exploitation attempts. 5) Educate users on the risks of installing apps from unofficial sources and the importance of device updates. 6) Where feasible, restrict local access to devices, especially in sensitive environments, and implement endpoint security solutions that can detect and block attempts to exploit kernel-level vulnerabilities. 7) Consider network segmentation and limiting device exposure to reduce the attack surface. These steps go beyond generic advice by focusing on device inventory, patch management, user behavior, and endpoint monitoring tailored to the specific chipset vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec92d

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 2:25:54 PM

Last updated: 8/14/2025, 7:22:03 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats