CVE-2022-42755: cwe-787 Out-of-bounds Write in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8023
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
AI Analysis
Technical Summary
CVE-2022-42755 is a medium-severity vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T310, T606, T610, T612, T616, T618, T760, T770, T820) as well as S8023. The vulnerability is classified as a CWE-787 Out-of-Bounds Write, which occurs due to a missing bounds check in the WLAN driver code. This flaw allows a local attacker with limited privileges (low complexity) to perform an out-of-bounds write operation in memory, potentially corrupting data structures or causing unexpected behavior within the WLAN service. The affected devices run Android versions 10, 11, and 12, which are common in many mobile devices using these chipsets. Exploitation does not require user interaction but does require local access with some privileges (PR:L), indicating that the attacker must have some level of access to the device, such as through a compromised app or local user account. The primary impact of this vulnerability is a denial of service (DoS) condition affecting WLAN services, which can disrupt wireless connectivity on the device. There is no indication of confidentiality or integrity compromise, and no known exploits have been reported in the wild as of the publication date (December 6, 2022). No patches or fixes are currently linked, suggesting that mitigation may rely on vendor updates or workarounds. The CVSS v3.1 score is 5.5 (medium), reflecting the limited scope and impact of the vulnerability but acknowledging the potential disruption to availability of WLAN services.
Potential Impact
For European organizations, the primary impact of CVE-2022-42755 is the potential disruption of wireless network connectivity on devices using affected Unisoc chipsets running Android 10-12. This can lead to temporary loss of network access, affecting productivity, communication, and access to cloud or internal resources reliant on Wi-Fi connectivity. While the vulnerability does not directly compromise data confidentiality or integrity, denial of WLAN service can indirectly impact operational continuity, especially in environments heavily dependent on mobile devices for critical tasks. Industries such as telecommunications, logistics, retail, and public services that utilize mobile devices with these chipsets may experience service interruptions. Additionally, the requirement for local access means that attackers would need to have already compromised the device or have physical access, limiting remote exploitation risks but increasing concerns about insider threats or malware that gains local execution. The lack of known exploits reduces immediate risk, but the vulnerability could be leveraged in targeted attacks to cause disruption or as part of a multi-stage attack chain.
Mitigation Recommendations
1. Monitor vendor communications from Unisoc and device manufacturers for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 2. Restrict local access to devices by enforcing strong device authentication, limiting installation of untrusted applications, and employing mobile device management (MDM) solutions to control app permissions and device configurations. 3. Implement network segmentation and access controls to reduce the impact of potential WLAN service disruptions on critical systems. 4. Use endpoint detection and response (EDR) tools to monitor for suspicious local activity that could indicate attempts to exploit this vulnerability. 5. Educate users on the risks of installing unverified applications or granting unnecessary permissions that could enable local attackers. 6. For organizations deploying devices with these chipsets, consider alternative hardware or updated devices with patched firmware to mitigate long-term risk. 7. In environments where WLAN availability is critical, establish fallback connectivity options such as cellular data or wired connections to maintain operational continuity during potential WLAN outages.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2022-42755: cwe-787 Out-of-bounds Write in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8023
Description
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
AI-Powered Analysis
Technical Analysis
CVE-2022-42755 is a medium-severity vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T310, T606, T610, T612, T616, T618, T760, T770, T820) as well as S8023. The vulnerability is classified as a CWE-787 Out-of-Bounds Write, which occurs due to a missing bounds check in the WLAN driver code. This flaw allows a local attacker with limited privileges (low complexity) to perform an out-of-bounds write operation in memory, potentially corrupting data structures or causing unexpected behavior within the WLAN service. The affected devices run Android versions 10, 11, and 12, which are common in many mobile devices using these chipsets. Exploitation does not require user interaction but does require local access with some privileges (PR:L), indicating that the attacker must have some level of access to the device, such as through a compromised app or local user account. The primary impact of this vulnerability is a denial of service (DoS) condition affecting WLAN services, which can disrupt wireless connectivity on the device. There is no indication of confidentiality or integrity compromise, and no known exploits have been reported in the wild as of the publication date (December 6, 2022). No patches or fixes are currently linked, suggesting that mitigation may rely on vendor updates or workarounds. The CVSS v3.1 score is 5.5 (medium), reflecting the limited scope and impact of the vulnerability but acknowledging the potential disruption to availability of WLAN services.
Potential Impact
For European organizations, the primary impact of CVE-2022-42755 is the potential disruption of wireless network connectivity on devices using affected Unisoc chipsets running Android 10-12. This can lead to temporary loss of network access, affecting productivity, communication, and access to cloud or internal resources reliant on Wi-Fi connectivity. While the vulnerability does not directly compromise data confidentiality or integrity, denial of WLAN service can indirectly impact operational continuity, especially in environments heavily dependent on mobile devices for critical tasks. Industries such as telecommunications, logistics, retail, and public services that utilize mobile devices with these chipsets may experience service interruptions. Additionally, the requirement for local access means that attackers would need to have already compromised the device or have physical access, limiting remote exploitation risks but increasing concerns about insider threats or malware that gains local execution. The lack of known exploits reduces immediate risk, but the vulnerability could be leveraged in targeted attacks to cause disruption or as part of a multi-stage attack chain.
Mitigation Recommendations
1. Monitor vendor communications from Unisoc and device manufacturers for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 2. Restrict local access to devices by enforcing strong device authentication, limiting installation of untrusted applications, and employing mobile device management (MDM) solutions to control app permissions and device configurations. 3. Implement network segmentation and access controls to reduce the impact of potential WLAN service disruptions on critical systems. 4. Use endpoint detection and response (EDR) tools to monitor for suspicious local activity that could indicate attempts to exploit this vulnerability. 5. Educate users on the risks of installing unverified applications or granting unnecessary permissions that could enable local attackers. 6. For organizations deploying devices with these chipsets, consider alternative hardware or updated devices with patched firmware to mitigate long-term risk. 7. In environments where WLAN availability is critical, establish fallback connectivity options such as cellular data or wired connections to maintain operational continuity during potential WLAN outages.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-10-11T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9843c4522896dcbf2cc5
Added to database: 5/21/2025, 9:09:23 AM
Last enriched: 6/23/2025, 10:36:06 AM
Last updated: 8/12/2025, 3:01:18 PM
Views: 12
Related Threats
CVE-2025-8985: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8984: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8983: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.