Skip to main content

CVE-2022-39132: CWE-126 Buffer Over-read in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Medium
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In camera driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.

AI-Powered Analysis

AILast updated: 06/24/2025, 02:59:45 UTC

Technical Analysis

CVE-2022-39132 is a medium-severity vulnerability identified in the camera driver of multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and several others (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). The vulnerability arises from a missing bounds check in the camera driver, leading to a possible out-of-bounds write condition. This is categorized under CWE-126 (Buffer Over-read) and CWE-787 (Out-of-bounds Write). The flaw affects devices running Android versions 10, 11, and 12 that incorporate these Unisoc chipsets. The vulnerability can be exploited locally by an attacker with low privileges (PR:L) and does not require user interaction (UI:N). Exploitation results in a denial of service (DoS) condition at the kernel level, impacting system availability but not confidentiality or integrity. The CVSS v3.1 base score is 5.5 (medium), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in early September 2022 and published in December 2022. The technical root cause is a missing bounds check in the camera driver code, which can cause out-of-bounds memory writes, potentially crashing the kernel or causing system instability. This vulnerability is relevant for devices using Unisoc chipsets, which are commonly found in budget and mid-range smartphones, particularly in markets where Unisoc has significant penetration. Given the local nature of the exploit, an attacker would need local access to the device, such as through a malicious app or physical access, to trigger the vulnerability.

Potential Impact

For European organizations, the primary impact of CVE-2022-39132 is the potential for local denial of service on devices using affected Unisoc chipsets. This could disrupt mobile device availability, particularly for employees relying on smartphones for communication, authentication, or mobile applications. While the vulnerability does not compromise confidentiality or integrity, the denial of service could affect operational continuity, especially in sectors where mobile device uptime is critical (e.g., logistics, field services, healthcare). The impact is more pronounced in organizations that deploy Unisoc-based devices as part of their mobile fleet or BYOD policies. Since exploitation requires local access and low privileges, the risk is mitigated somewhat by device security controls, but malicious apps or insider threats could leverage this vulnerability to cause disruptions. Additionally, the lack of a patch increases the window of exposure. The vulnerability does not appear to enable remote code execution or privilege escalation, limiting its use in large-scale attacks but still posing a risk for targeted disruption.

Mitigation Recommendations

1. Device Inventory and Assessment: Identify all devices within the organization that utilize Unisoc chipsets listed in the advisory and run affected Android versions (10, 11, 12). 2. Restrict Local Access: Enforce strict application installation policies to prevent installation of untrusted or malicious apps that could exploit the vulnerability locally. Use Mobile Device Management (MDM) solutions to whitelist approved applications. 3. Monitor for Anomalies: Implement monitoring for unusual device crashes or kernel panics that could indicate exploitation attempts. 4. Firmware and OS Updates: Engage with device vendors and Unisoc to obtain patches or firmware updates as soon as they become available. Prioritize deployment of updates to devices in critical roles. 5. User Awareness: Educate users about the risks of installing apps from untrusted sources and the importance of device security hygiene. 6. Physical Security: Limit physical access to devices to reduce risk of local exploitation. 7. Isolation of Critical Devices: For highly sensitive environments, consider isolating or restricting use of affected devices until patches are available. 8. Incident Response Preparedness: Prepare to respond to denial of service incidents on mobile devices, including rapid device replacement or reimaging procedures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf155a

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 2:59:45 AM

Last updated: 7/26/2025, 1:18:45 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats