Skip to main content

CVE-2022-42755: cwe-787 Out-of-bounds Write in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8023

Medium
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8023

Description

In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.

AI-Powered Analysis

AILast updated: 06/23/2025, 10:36:06 UTC

Technical Analysis

CVE-2022-42755 is a medium-severity vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T310, T606, T610, T612, T616, T618, T760, T770, T820) as well as S8023. The vulnerability is classified as a CWE-787 Out-of-Bounds Write, which occurs due to a missing bounds check in the WLAN driver code. This flaw allows a local attacker with limited privileges (low complexity) to perform an out-of-bounds write operation in memory, potentially corrupting data structures or causing unexpected behavior within the WLAN service. The affected devices run Android versions 10, 11, and 12, which are common in many mobile devices using these chipsets. Exploitation does not require user interaction but does require local access with some privileges (PR:L), indicating that the attacker must have some level of access to the device, such as through a compromised app or local user account. The primary impact of this vulnerability is a denial of service (DoS) condition affecting WLAN services, which can disrupt wireless connectivity on the device. There is no indication of confidentiality or integrity compromise, and no known exploits have been reported in the wild as of the publication date (December 6, 2022). No patches or fixes are currently linked, suggesting that mitigation may rely on vendor updates or workarounds. The CVSS v3.1 score is 5.5 (medium), reflecting the limited scope and impact of the vulnerability but acknowledging the potential disruption to availability of WLAN services.

Potential Impact

For European organizations, the primary impact of CVE-2022-42755 is the potential disruption of wireless network connectivity on devices using affected Unisoc chipsets running Android 10-12. This can lead to temporary loss of network access, affecting productivity, communication, and access to cloud or internal resources reliant on Wi-Fi connectivity. While the vulnerability does not directly compromise data confidentiality or integrity, denial of WLAN service can indirectly impact operational continuity, especially in environments heavily dependent on mobile devices for critical tasks. Industries such as telecommunications, logistics, retail, and public services that utilize mobile devices with these chipsets may experience service interruptions. Additionally, the requirement for local access means that attackers would need to have already compromised the device or have physical access, limiting remote exploitation risks but increasing concerns about insider threats or malware that gains local execution. The lack of known exploits reduces immediate risk, but the vulnerability could be leveraged in targeted attacks to cause disruption or as part of a multi-stage attack chain.

Mitigation Recommendations

1. Monitor vendor communications from Unisoc and device manufacturers for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 2. Restrict local access to devices by enforcing strong device authentication, limiting installation of untrusted applications, and employing mobile device management (MDM) solutions to control app permissions and device configurations. 3. Implement network segmentation and access controls to reduce the impact of potential WLAN service disruptions on critical systems. 4. Use endpoint detection and response (EDR) tools to monitor for suspicious local activity that could indicate attempts to exploit this vulnerability. 5. Educate users on the risks of installing unverified applications or granting unnecessary permissions that could enable local attackers. 6. For organizations deploying devices with these chipsets, consider alternative hardware or updated devices with patched firmware to mitigate long-term risk. 7. In environments where WLAN availability is critical, establish fallback connectivity options such as cellular data or wired connections to maintain operational continuity during potential WLAN outages.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-10-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf2cc5

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 10:36:06 AM

Last updated: 8/12/2025, 3:01:18 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats