CVE-2022-39130: CWE-126 Buffer Over-read in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
In face detect driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
AI Analysis
Technical Summary
CVE-2022-39130 is a medium-severity vulnerability identified in the face detect driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, specifically models SC9863A, SC9832E, SC7731E, T310, T606, T610, T612, T616, T618, T760, T770, T820, and S8000. These chipsets are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability arises from a missing bounds check in the face detect driver's code, leading to a buffer over-read condition classified under CWE-126 (Buffer Over-read) and CWE-125 (Out-of-bounds Read). This flaw allows an attacker with local privileges and low complexity to perform an out-of-bounds write operation in kernel memory. The consequence of this vulnerability is a potential local denial of service (DoS) due to kernel instability or crashes. The CVSS v3.1 base score is 5.5, reflecting medium severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). There are no known exploits in the wild, and no official patches have been linked yet. The vulnerability is specific to Unisoc chipsets used in Android devices, which are often found in budget and mid-range smartphones, particularly in emerging markets. The vulnerability requires local access, meaning an attacker must have some level of access to the device, either physically or via a compromised user account or application. Exploitation does not require user interaction, increasing the risk if local access is obtained. The kernel-level impact means that successful exploitation can cause system crashes or reboots, leading to denial of service conditions that affect device availability.
Potential Impact
For European organizations, the impact of CVE-2022-39130 is primarily related to the availability of mobile devices using affected Unisoc chipsets. While the vulnerability does not compromise confidentiality or integrity, a local denial of service can disrupt business operations relying on mobile communications, especially in sectors where mobile devices are critical for fieldwork, logistics, or secure communications. The affected devices are typically lower-cost smartphones, which may be used by employees in organizations with cost-sensitive procurement policies or in subsidiaries operating in emerging European markets. The inability to patch or mitigate this vulnerability promptly could lead to increased downtime or device instability, potentially impacting productivity. Additionally, if attackers leverage this vulnerability as part of a multi-stage attack chain, it could serve as a foothold for further local privilege escalation or kernel exploitation, although such scenarios are not currently documented. The lack of known exploits reduces immediate risk but does not eliminate the potential for future exploitation. Organizations with Bring Your Own Device (BYOD) policies should be aware that employees using vulnerable devices could introduce availability risks. Critical infrastructure sectors that rely on mobile devices for operational continuity should assess exposure carefully. Overall, the impact is moderate but warrants attention due to the kernel-level nature of the vulnerability and the potential for denial of service.
Mitigation Recommendations
1. Device Inventory and Identification: Organizations should identify and inventory mobile devices using Unisoc chipsets listed in the affected product range, focusing on Android 10, 11, and 12 versions. 2. Firmware and OS Updates: Monitor Unisoc and device manufacturers for official patches or firmware updates addressing CVE-2022-39130. Apply updates promptly once available. 3. Restrict Local Access: Since exploitation requires local privileges, enforce strict device access controls, including strong authentication mechanisms (PIN, biometrics) and device encryption to prevent unauthorized local access. 4. Application Whitelisting and Hardening: Limit installation of untrusted applications that could exploit local vulnerabilities. Use mobile device management (MDM) solutions to enforce application control policies. 5. User Awareness: Educate users about the risks of installing untrusted apps or granting unnecessary permissions that could lead to local compromise. 6. Network Segmentation: For devices used in sensitive environments, segment mobile device networks to limit the impact of potential device unavailability. 7. Incident Response Preparedness: Develop procedures to quickly identify and respond to device crashes or unusual behavior indicative of exploitation attempts. 8. Alternative Hardware Consideration: For high-risk environments, consider deploying devices with chipsets from vendors with faster patch cycles or better security track records. 9. Monitor Security Advisories: Continuously monitor advisories from Unisoc, Android security bulletins, and CERT-EU for updates on this vulnerability and related threats. These mitigations go beyond generic advice by focusing on device-specific inventory, access control, and operational policies tailored to the nature of this kernel-level local DoS vulnerability.
Affected Countries
Germany, France, Italy, Spain, Poland, United Kingdom, Netherlands, Belgium, Romania, Greece
CVE-2022-39130: CWE-126 Buffer Over-read in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
Description
In face detect driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
AI-Powered Analysis
Technical Analysis
CVE-2022-39130 is a medium-severity vulnerability identified in the face detect driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, specifically models SC9863A, SC9832E, SC7731E, T310, T606, T610, T612, T616, T618, T760, T770, T820, and S8000. These chipsets are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability arises from a missing bounds check in the face detect driver's code, leading to a buffer over-read condition classified under CWE-126 (Buffer Over-read) and CWE-125 (Out-of-bounds Read). This flaw allows an attacker with local privileges and low complexity to perform an out-of-bounds write operation in kernel memory. The consequence of this vulnerability is a potential local denial of service (DoS) due to kernel instability or crashes. The CVSS v3.1 base score is 5.5, reflecting medium severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). There are no known exploits in the wild, and no official patches have been linked yet. The vulnerability is specific to Unisoc chipsets used in Android devices, which are often found in budget and mid-range smartphones, particularly in emerging markets. The vulnerability requires local access, meaning an attacker must have some level of access to the device, either physically or via a compromised user account or application. Exploitation does not require user interaction, increasing the risk if local access is obtained. The kernel-level impact means that successful exploitation can cause system crashes or reboots, leading to denial of service conditions that affect device availability.
Potential Impact
For European organizations, the impact of CVE-2022-39130 is primarily related to the availability of mobile devices using affected Unisoc chipsets. While the vulnerability does not compromise confidentiality or integrity, a local denial of service can disrupt business operations relying on mobile communications, especially in sectors where mobile devices are critical for fieldwork, logistics, or secure communications. The affected devices are typically lower-cost smartphones, which may be used by employees in organizations with cost-sensitive procurement policies or in subsidiaries operating in emerging European markets. The inability to patch or mitigate this vulnerability promptly could lead to increased downtime or device instability, potentially impacting productivity. Additionally, if attackers leverage this vulnerability as part of a multi-stage attack chain, it could serve as a foothold for further local privilege escalation or kernel exploitation, although such scenarios are not currently documented. The lack of known exploits reduces immediate risk but does not eliminate the potential for future exploitation. Organizations with Bring Your Own Device (BYOD) policies should be aware that employees using vulnerable devices could introduce availability risks. Critical infrastructure sectors that rely on mobile devices for operational continuity should assess exposure carefully. Overall, the impact is moderate but warrants attention due to the kernel-level nature of the vulnerability and the potential for denial of service.
Mitigation Recommendations
1. Device Inventory and Identification: Organizations should identify and inventory mobile devices using Unisoc chipsets listed in the affected product range, focusing on Android 10, 11, and 12 versions. 2. Firmware and OS Updates: Monitor Unisoc and device manufacturers for official patches or firmware updates addressing CVE-2022-39130. Apply updates promptly once available. 3. Restrict Local Access: Since exploitation requires local privileges, enforce strict device access controls, including strong authentication mechanisms (PIN, biometrics) and device encryption to prevent unauthorized local access. 4. Application Whitelisting and Hardening: Limit installation of untrusted applications that could exploit local vulnerabilities. Use mobile device management (MDM) solutions to enforce application control policies. 5. User Awareness: Educate users about the risks of installing untrusted apps or granting unnecessary permissions that could lead to local compromise. 6. Network Segmentation: For devices used in sensitive environments, segment mobile device networks to limit the impact of potential device unavailability. 7. Incident Response Preparedness: Develop procedures to quickly identify and respond to device crashes or unusual behavior indicative of exploitation attempts. 8. Alternative Hardware Consideration: For high-risk environments, consider deploying devices with chipsets from vendors with faster patch cycles or better security track records. 9. Monitor Security Advisories: Continuously monitor advisories from Unisoc, Android security bulletins, and CERT-EU for updates on this vulnerability and related threats. These mitigations go beyond generic advice by focusing on device-specific inventory, access control, and operational policies tailored to the nature of this kernel-level local DoS vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-09-01T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9840c4522896dcbf1552
Added to database: 5/21/2025, 9:09:20 AM
Last enriched: 6/24/2025, 3:09:53 AM
Last updated: 8/8/2025, 10:24:45 AM
Views: 12
Related Threats
CVE-2025-3495: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Delta Electronics COMMGR
CriticalCVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.