Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-42755: cwe-787 Out-of-bounds Write in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8023

0
Medium
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8023

Description

In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.

AI-Powered Analysis

AILast updated: 06/23/2025, 10:36:06 UTC

Technical Analysis

CVE-2022-42755 is a medium-severity vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T310, T606, T610, T612, T616, T618, T760, T770, T820) as well as S8023. The vulnerability is classified as a CWE-787 Out-of-Bounds Write, which occurs due to a missing bounds check in the WLAN driver code. This flaw allows a local attacker with limited privileges (low complexity) to perform an out-of-bounds write operation in memory, potentially corrupting data structures or causing unexpected behavior within the WLAN service. The affected devices run Android versions 10, 11, and 12, which are common in many mobile devices using these chipsets. Exploitation does not require user interaction but does require local access with some privileges (PR:L), indicating that the attacker must have some level of access to the device, such as through a compromised app or local user account. The primary impact of this vulnerability is a denial of service (DoS) condition affecting WLAN services, which can disrupt wireless connectivity on the device. There is no indication of confidentiality or integrity compromise, and no known exploits have been reported in the wild as of the publication date (December 6, 2022). No patches or fixes are currently linked, suggesting that mitigation may rely on vendor updates or workarounds. The CVSS v3.1 score is 5.5 (medium), reflecting the limited scope and impact of the vulnerability but acknowledging the potential disruption to availability of WLAN services.

Potential Impact

For European organizations, the primary impact of CVE-2022-42755 is the potential disruption of wireless network connectivity on devices using affected Unisoc chipsets running Android 10-12. This can lead to temporary loss of network access, affecting productivity, communication, and access to cloud or internal resources reliant on Wi-Fi connectivity. While the vulnerability does not directly compromise data confidentiality or integrity, denial of WLAN service can indirectly impact operational continuity, especially in environments heavily dependent on mobile devices for critical tasks. Industries such as telecommunications, logistics, retail, and public services that utilize mobile devices with these chipsets may experience service interruptions. Additionally, the requirement for local access means that attackers would need to have already compromised the device or have physical access, limiting remote exploitation risks but increasing concerns about insider threats or malware that gains local execution. The lack of known exploits reduces immediate risk, but the vulnerability could be leveraged in targeted attacks to cause disruption or as part of a multi-stage attack chain.

Mitigation Recommendations

1. Monitor vendor communications from Unisoc and device manufacturers for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 2. Restrict local access to devices by enforcing strong device authentication, limiting installation of untrusted applications, and employing mobile device management (MDM) solutions to control app permissions and device configurations. 3. Implement network segmentation and access controls to reduce the impact of potential WLAN service disruptions on critical systems. 4. Use endpoint detection and response (EDR) tools to monitor for suspicious local activity that could indicate attempts to exploit this vulnerability. 5. Educate users on the risks of installing unverified applications or granting unnecessary permissions that could enable local attackers. 6. For organizations deploying devices with these chipsets, consider alternative hardware or updated devices with patched firmware to mitigate long-term risk. 7. In environments where WLAN availability is critical, establish fallback connectivity options such as cellular data or wired connections to maintain operational continuity during potential WLAN outages.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-10-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf2cc5

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 10:36:06 AM

Last updated: 2/7/2026, 9:32:52 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats