Skip to main content

CVE-2022-39130: CWE-126 Buffer Over-read in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Medium
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In face detect driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.

AI-Powered Analysis

AILast updated: 06/24/2025, 03:09:53 UTC

Technical Analysis

CVE-2022-39130 is a medium-severity vulnerability identified in the face detect driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, specifically models SC9863A, SC9832E, SC7731E, T310, T606, T610, T612, T616, T618, T760, T770, T820, and S8000. These chipsets are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability arises from a missing bounds check in the face detect driver's code, leading to a buffer over-read condition classified under CWE-126 (Buffer Over-read) and CWE-125 (Out-of-bounds Read). This flaw allows an attacker with local privileges and low complexity to perform an out-of-bounds write operation in kernel memory. The consequence of this vulnerability is a potential local denial of service (DoS) due to kernel instability or crashes. The CVSS v3.1 base score is 5.5, reflecting medium severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). There are no known exploits in the wild, and no official patches have been linked yet. The vulnerability is specific to Unisoc chipsets used in Android devices, which are often found in budget and mid-range smartphones, particularly in emerging markets. The vulnerability requires local access, meaning an attacker must have some level of access to the device, either physically or via a compromised user account or application. Exploitation does not require user interaction, increasing the risk if local access is obtained. The kernel-level impact means that successful exploitation can cause system crashes or reboots, leading to denial of service conditions that affect device availability.

Potential Impact

For European organizations, the impact of CVE-2022-39130 is primarily related to the availability of mobile devices using affected Unisoc chipsets. While the vulnerability does not compromise confidentiality or integrity, a local denial of service can disrupt business operations relying on mobile communications, especially in sectors where mobile devices are critical for fieldwork, logistics, or secure communications. The affected devices are typically lower-cost smartphones, which may be used by employees in organizations with cost-sensitive procurement policies or in subsidiaries operating in emerging European markets. The inability to patch or mitigate this vulnerability promptly could lead to increased downtime or device instability, potentially impacting productivity. Additionally, if attackers leverage this vulnerability as part of a multi-stage attack chain, it could serve as a foothold for further local privilege escalation or kernel exploitation, although such scenarios are not currently documented. The lack of known exploits reduces immediate risk but does not eliminate the potential for future exploitation. Organizations with Bring Your Own Device (BYOD) policies should be aware that employees using vulnerable devices could introduce availability risks. Critical infrastructure sectors that rely on mobile devices for operational continuity should assess exposure carefully. Overall, the impact is moderate but warrants attention due to the kernel-level nature of the vulnerability and the potential for denial of service.

Mitigation Recommendations

1. Device Inventory and Identification: Organizations should identify and inventory mobile devices using Unisoc chipsets listed in the affected product range, focusing on Android 10, 11, and 12 versions. 2. Firmware and OS Updates: Monitor Unisoc and device manufacturers for official patches or firmware updates addressing CVE-2022-39130. Apply updates promptly once available. 3. Restrict Local Access: Since exploitation requires local privileges, enforce strict device access controls, including strong authentication mechanisms (PIN, biometrics) and device encryption to prevent unauthorized local access. 4. Application Whitelisting and Hardening: Limit installation of untrusted applications that could exploit local vulnerabilities. Use mobile device management (MDM) solutions to enforce application control policies. 5. User Awareness: Educate users about the risks of installing untrusted apps or granting unnecessary permissions that could lead to local compromise. 6. Network Segmentation: For devices used in sensitive environments, segment mobile device networks to limit the impact of potential device unavailability. 7. Incident Response Preparedness: Develop procedures to quickly identify and respond to device crashes or unusual behavior indicative of exploitation attempts. 8. Alternative Hardware Consideration: For high-risk environments, consider deploying devices with chipsets from vendors with faster patch cycles or better security track records. 9. Monitor Security Advisories: Continuously monitor advisories from Unisoc, Android security bulletins, and CERT-EU for updates on this vulnerability and related threats. These mitigations go beyond generic advice by focusing on device-specific inventory, access control, and operational policies tailored to the nature of this kernel-level local DoS vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf1552

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 3:09:53 AM

Last updated: 8/8/2025, 10:24:45 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats