Skip to main content

CVE-2022-39134: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Medium
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In audio driver, there is a use after free due to a race condition. This could lead to local denial of service in kernel.

AI-Powered Analysis

AILast updated: 06/24/2025, 02:59:07 UTC

Technical Analysis

CVE-2022-39134 is a medium-severity vulnerability identified in the audio driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8000. These chipsets are commonly integrated into Android devices running versions 10, 11, and 12. The vulnerability arises from a race condition (CWE-362) in the audio driver, specifically a use-after-free scenario caused by improper synchronization when accessing shared resources concurrently. This flaw can be triggered locally by a user with low privileges (PR:L) without requiring any user interaction (UI:N). Exploiting this vulnerability can lead to a denial of service (DoS) condition in the kernel, effectively causing the affected device to crash or become unresponsive. The CVSS v3.1 base score is 4.7, reflecting a medium severity level, with the attack vector being local, requiring high attack complexity, and no impact on confidentiality or integrity, but a high impact on availability. No known public exploits have been reported in the wild, and no patches have been linked or published by the vendor as of the data provided. The root cause is improper synchronization in concurrent execution, which is a common challenge in driver development, especially in resource-constrained embedded environments. Given the affected chipsets are widely used in budget and mid-range Android smartphones, the vulnerability could affect a significant number of devices globally, particularly those using Unisoc SoCs in the specified Android versions.

Potential Impact

For European organizations, the primary impact of CVE-2022-39134 is the potential for local denial of service on devices using affected Unisoc chipsets. This could disrupt business operations relying on mobile devices for communication, authentication, or fieldwork. Although the vulnerability does not allow for data leakage or privilege escalation, the kernel-level DoS could cause device crashes or reboots, leading to loss of availability. This is particularly critical for sectors relying on mobile devices for critical communications such as emergency services, healthcare, and logistics. Additionally, organizations deploying mobile device management (MDM) solutions or BYOD policies may face increased support costs and operational disruptions if affected devices become unstable. The lack of remote exploitability limits the threat to local attackers or malicious apps installed on the device, but insider threats or compromised devices could leverage this vulnerability to cause denial of service. The absence of known exploits reduces immediate risk, but the medium severity and kernel-level impact warrant proactive mitigation to maintain device reliability and availability.

Mitigation Recommendations

Implement strict application whitelisting and restrict installation of untrusted or third-party apps to reduce the risk of local exploitation. Enforce least privilege principles on mobile devices to limit the ability of low-privilege users or apps to trigger the race condition. Monitor device stability and kernel logs for signs of crashes or abnormal reboots that could indicate exploitation attempts. Engage with device vendors and Unisoc to obtain and deploy firmware or driver updates as soon as patches become available. For enterprise deployments, consider temporarily restricting use of affected devices in critical roles until patches are applied. Educate users on the risks of installing unverified applications and encourage regular device updates to minimize exposure. Incorporate vulnerability scanning and mobile threat defense solutions that can detect anomalous behavior related to kernel crashes. Where feasible, isolate critical mobile workloads from devices using affected chipsets or Android versions to reduce operational impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf1562

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 2:59:07 AM

Last updated: 8/4/2025, 2:37:18 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats